ebook-extractor

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes local Python scripts (e.g., extract.py) and invokes the ebook-convert utility from the Calibre suite for file format conversion and extraction.
  • [EXTERNAL_DOWNLOADS]: Installation requires fetching Python packages including ebooklib, beautifulsoup4, and PyMuPDF, as well as the Calibre software via system package managers.
  • [PROMPT_INJECTION]: The skill processes untrusted content from external ebook files which can lead to indirect prompt injection if the agent interprets instructions embedded within the extracted text. 1. Ingestion points: External EPUB, MOBI, and PDF files (SKILL.md). 2. Boundary markers: None identified in the provided implementation. 3. Capability inventory: Local Python execution and system command invocation (SKILL.md). 4. Sanitization: No sanitization of extracted text is described.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 01:53 PM